Stephen McCombie
Stephen McCombie
Department of Security Studies and Criminology, Macquarie University
Verified email at mq.edu.au - Homepage
Title
Cited by
Cited by
Year
Stuxnet: the emergence of a new cyber weapon and its implications
S Collins, S McCombie
Journal of Policing, Intelligence and Counter Terrorism 7 (1), 80-91, 2012
922012
Characterising and Predicting Cyber Attacks Using the Cyber Attacker Model Profile (CAMP)
P Watters, S McCombie, J Pieprzyk, R Layton
Journal of Money Laundering Control 15 (4), 2012
352012
A preliminary profiling of internet money mules: an Australian perspective
M Aston, S McCombie, B Reardon, P Watters
2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing …, 2009
242009
Authorship attribution of irc messages using inverse author frequency
R Layton, S McCombie, P Watters
2012 Third Cybercrime and Trustworthy Computing Workshop, 7-13, 2012
202012
Cybercrime attribution: An eastern european case study
S McCombie, J Pieprzyk, P Watters
192009
Forensic characteristics of phishing petty theft or organized crime?
S McCombie, P Watters, A Ng, B Watson
WEBIST 2008-4th International Conference on Web Information Systems and …, 2008
192008
Winning the phishing war: A strategy for Australia
S McCombie, J Pieprzyk
2010 Second Cybercrime and Trustworthy Computing Workshop, 79-86, 2010
182010
Visualization of ATM usage patterns to detect counterfeit cards usage
B Reardon, K Nance, S McCombie
2012 45th Hawaii International Conference on System Sciences, 3081-3088, 2012
112012
ICANN or ICANT: Is WHOIS an Enabler of Cybercrime?
PA Watters, A Herps, R Layton, S McCombie
2013 Fourth Cybercrime and Trustworthy Computing Workshop, 44-49, 2013
92013
Trouble in Florida: the Genesis of Phishing attacks on Australian banks
S McCombie
School of Computer and Information Science, Edith Cowan University, Perth …, 2008
92008
Computer Forensic: An Issue of Definitions.
S McCombie, M Warren
Australian Computer, Network & Information Forensics Conference, 2003
82003
Phishing the Long Line: Transnational Cybercrime from Eastern Europe to Australia
SJ McCombie
Macquarie University, Faculty of Science, Department of Computing, 2011
72011
A profile of an information warfare attack
S McCombie, M Warren
Deakin University, School of Computing and Mathematics, 2000
62000
A methodology for analyzing the credential marketplace
PA Watters, S McCombie
Journal of Money Laundering Control, 2011
42011
Threat actor oriented strategy: Knowing your enemy to better defend, detect and respond to cyber-attacks
S McCombie
Journal of the Australian Institute of Professional Intelligence Officers 26 …, 2018
22018
The US 2016 presidential election & Russia’s troll farms
S McCombie, AJ Uhlmann, S Morrison
Intelligence and National Security 35 (1), 95-114, 2020
12020
Russia, Ukraine and Global Cybercrime: The Australian Perspective
S McCombie, J Pieprzyk, P Watters, R Layton
Issues in cybercrime, security and digital forensics, 197-210, 2012
12012
The Russian gambit and the US intelligence community: Russia's use of kompromat and implausible deniability to optimize its 2016 information campaign against the US …
AJ Uhlmann, S McCombie
Library Trends 68 (4), 2020
2020
Discerning payment patterns in Bitcoin from Ransomware attacks
A Turner, S McCombie, AJ Uhlmann
Journal of Money Laundering Control, 2020
2020
A target-centric intelligence approach to WannaCry 2.0
AB Turner, S McCombie, AJ Uhlmann
Journal of Money Laundering Control, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20